![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.831740 |
Category: | Mandrake Local Security Checks |
Title: | Mandriva Update for openjpeg MDVSA-2012:157 (openjpeg) |
Summary: | The remote host is missing an update for the 'openjpeg'; package(s) announced via the referenced advisory. |
Description: | Summary: The remote host is missing an update for the 'openjpeg' package(s) announced via the referenced advisory. Vulnerability Insight: A security issue was identified and fixed in openjpeg: A heap-based buffer overflow was found in the way OpenJPEG, an open-source JPEG 2000 codec written in C language, performed parsing of JPEG2000 image files. A remote attacker could provide a specially crafted JPEG 2000 file, which when opened in an application linked against openjpeg would lead to that application crash, or, potentially arbitrary code execution with the privileges of the user running the application (CVE-2012-3535). The updated packages have been patched to correct this issue. Affected Software/OS: openjpeg on Mandriva Linux 2011.0 Solution: Please Install the Updated Packages. CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-3535 50360 http://secunia.com/advisories/50360 50681 http://secunia.com/advisories/50681 55214 http://www.securityfocus.com/bid/55214 84978 http://osvdb.org/84978 FEDORA-2012-14664 http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090021.html FEDORA-2012-14707 http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090579.html MDVSA-2012:157 http://www.mandriva.com/security/advisories?name=MDVSA-2012:157 RHSA-2012:1283 http://rhn.redhat.com/errata/RHSA-2012-1283.html [oss-security] 20120827 CVE Request: Heap-based buffer overflow in openjpeg http://www.openwall.com/lists/oss-security/2012/08/27/2 [oss-security] 20120827 Re: CVE Request: Heap-based buffer overflow in openjpeg http://www.openwall.com/lists/oss-security/2012/08/27/3 http://code.google.com/p/openjpeg/issues/detail?id=170 https://bugzilla.redhat.com/show_bug.cgi?id=842918 openjpeg-files-bo(77994) https://exchange.xforce.ibmcloud.com/vulnerabilities/77994 |
Copyright | Copyright (C) 2012 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |